timhudson / jwt-secretLinks
Bruteforce a JWT against a list of passwords
☆79Updated 8 years ago
Alternatives and similar repositories for jwt-secret
Users that are interested in jwt-secret are comparing it to the libraries listed below
Sorting:
- ☆76Updated 5 years ago
- DNS and Target HTTP History Local Storage and Search☆64Updated 4 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Updated 4 months ago
- ASN reconnaissance script☆133Updated last year
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Updated 4 years ago
- Find subdomains and takeovers.☆86Updated 2 years ago
- Generate wordlists for fuzzing API method names☆54Updated 5 years ago
- Misc bounty and vulndisc things☆85Updated 4 years ago
- ☆69Updated 3 years ago
- ☆44Updated 5 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆66Updated last year
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆98Updated 3 years ago
- Recon Custom WordList Ganerator☆58Updated 5 years ago
- The commands and scripts I used in the Live Recon Village talks☆39Updated 4 years ago
- ☆108Updated 5 years ago
- CircleCI log and security configuration automations☆22Updated 5 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 3 years ago
- A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!☆89Updated 5 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- ☆73Updated 4 years ago
- A combined wordlists for files and directory discovery☆126Updated 4 years ago
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Updated 2 years ago
- Reclaim control of your Burp Suite Repeater tabs with this powerful extension☆68Updated 4 years ago
- Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs☆97Updated 4 years ago
- Recon for Department of Defense HackerOne program☆46Updated 7 years ago
- A natural evolution of Burp Suite's Repeater tool☆94Updated 2 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆52Updated 4 years ago
- Host Header Injection Checker☆83Updated 3 years ago
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆103Updated 5 years ago